Main Reference PaperSecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things, 2018 [Contiki-Cooja Simulator]
  • Airehrour, David, Jairo A. Gutierrez, and Sayan Kumar Ray.

Author Name(s):
  • Airehrour, David, Jairo A. Gutierrez, and Sayan Kumar Ray.

  • Future Generation Computer Systems, 2018

Journal Name and year:
  • Future Generation Computer Systems, 2018

  • 10.1016/j.future.2018.03.021

DOI:
  • 10.1016/j.future.2018.03.021

  • Internet of Things (IoT)

Research Area:
  • Internet of Things (IoT)

  • To secure IoT networks from routing attacks, a time-based trust-aware RPL routing protocol (SecTrust-RPL) is proposed and implemented.

  • The Secure Trust (SecTrust) trust system is embedded into the RPL routing protocol to provide protection against Rank and Sybil attacks

  • SecTrust-RPL uses a trust-based mechanism to detect and isolate attacks while optimizing network performance.

  • The performance of SecTrust-RPL is compared with the standard RPL protocol.

  • SecTrust-RPL protocol demonstrates its superior performance over the standard RPL protocol in the detection and isolation of Rank and Sybil attacks.

  • The effectiveness and resilience of SecTrust-RPL is demonstrated through extensive simulation studies and testbed experiments.

  • Based on SecTrust-RPL, we show as a proof-of-concept the viability of using trust as an effective security system for mitigating attacks in IoT networks.

Abstract:
  • To secure IoT networks from routing attacks, a time-based trust-aware RPL routing protocol (SecTrust-RPL) is proposed and implemented.

  • The Secure Trust (SecTrust) trust system is embedded into the RPL routing protocol to provide protection against Rank and Sybil attacks

  • SecTrust-RPL uses a trust-based mechanism to detect and isolate attacks while optimizing network performance.

  • The performance of SecTrust-RPL is compared with the standard RPL protocol.

  • SecTrust-RPL protocol demonstrates its superior performance over the standard RPL protocol in the detection and isolation of Rank and Sybil attacks.

  • The effectiveness and resilience of SecTrust-RPL is demonstrated through extensive simulation studies and testbed experiments.

  • Based on SecTrust-RPL, we show as a proof-of-concept the viability of using trust as an effective security system for mitigating attacks in IoT networks.

  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit